Some loyalty programs high status will give you 24 hours in a room, any 24 hours you want…
But you would be spending crazy money to get that status anyway, cheaper to just book two nights when you want more time in the room.
Some loyalty programs high status will give you 24 hours in a room, any 24 hours you want…
But you would be spending crazy money to get that status anyway, cheaper to just book two nights when you want more time in the room.
In most environments ipv6 bypasses cgnat (because, why would you need a nat with ipv6).
https://www.wireguard.com/netns/
Here is a good how to for wireguard. Most commercial VPNs let you connect directly with wireguard.
Basically crate the interface in your clearnet namespace and then move it to your vpn namespace
A container in a container…
I stand by what I said. If you examine who supports those organizations, they are getting a benefit.
The US Navy supports tor more than anybody else. Not to mention all of the government-run exit notes. Now you’re the product here, is the product watching your data? Or is the product providing noise for their clandestine operations? Tor is a great thing, 100%, but it is being supported by people who get a benefit from it.
I’m sure you can find a counter example, but the point is it’s about incentives. If the incentives aren’t aligned you can’t trust it. Not for mission critical objectives
If you don’t pay money for something, you are the product. In this case it would be your net flow data. It’s not a good idea to use a free service if you’re worried about privacy
I wish it were that easy, there’s a lot of shared architecture in CPU design. So maybe there’s cache lines that are shared, those have to be disabled.
Architecturally, maybe memory tagging for cash lines that in addition to looking at the TLB and physical addresses also looks at memory spaces. So if you’re addressing something that’s in the cache Even for another complete processor, you have to take the full hit going out to main memory.
But even then it’s not perfect, because if you’re invalidating the cache of another core there is going to be some memory penalty, probably infotesimal compared to going to main memory, but it might be measurable. I’m almost certain it would be measurable. So still a side channel attack
One mitigation that does come to mind, is running each program in a virtual machine, that way it’s guaranteed to have completely different physical address space. This is really heavy-handed, and I have seen some papers about the side channel attacks getting leaked information from co guest VMs in AWS. But it certainly reduces the risk surface
Everything you said is true, but I don’t think it’s the complete answer the OP would like.
For instance if somebody goes to Google, on the raw network, and on the VPN. They would correctly expect that traffic to take two different routes, and come from different IP addresses Even if the destination target IP address is the same
I’m afraid as long as you have shared architecture you will always have side channel data leaks. The only true mitigation is dedicated resources per compute item. So dedicated cores, dedicated cache etc
Network namespaces!
ip netns exec namespace command
One namespace for surfshark, and anything you run in that namespace uses those rules
https://www.privacyguides.org/en/advanced/payments/
Monero is the only privacy digital cash equivalent I’m aware of. There are a limited number of vendors who will accept it, and any of your friends who you can convince to take monero will also accept it
Here’s a list of known services that accept it. Things like VPNs, web hosting, email hosting, game hosting, internet services basically
Any of the other payment systems, the bank systems like zelle, PayPal, etc … They all have the problem of introducing a third party into your transactions. Who will then almost certainly sell your data
I set this up a while ago, so the services are a little dated there might be something better.
I also use speedify, and I use 10, yes 10, different mullvad VPN connections.
I have three internet connections at home. Each of the three connections has a wire guard connection to my two closest mullvad cities and one connection across the Pacific.
Speedify sees the wireguard tunnels, and each of the three uplinks. And I can use that to aggregate all the different pathways and do a first pass the post race for every packet.
Every packet gets replicated 13 times, and it races across the ocean, and the first one there gets delivered to the destination.
It’s great for gaming! I was able to shave off 65 milliseconds of latency to game servers across the ocean.
Is this wasteful? Absolutely, but it’s fun! The reason I use 10 mullvad connections is just because you get 5 simultaneous logins per account.
There’s a couple different ways to set this up, Linux network name spaces, really intricate wire guard configurations, VLANs. I went with VLANs, it was the most robust and portable across different devices.
https://support.speedify.com/article/918-openwrt
Oh well, I had no idea that speedified now supports Open WRT directly. That’s great
What’s not great is the new router plan, three terabytes per month limitation, 5x the price of the individual plan…
Discord’s main killer feature is Discovery of who is currently voice chatting in a room.
I’ve not seen any alternative platform that has the same level of voice discovery that discord does. Discord makes it easy to have a community, oh I see Bob’s online, let’s jump in and say hi.
It really is the local bar, you can just walk up and talk to anybody. That is absolutely critical. It’s open discovery, it’s effortless communication of status.
Here’s an open source company that provides you a different circuit for each socket. So a new IP for every link…
tis-100 is great
A refrigerator uses a compression cycle to pump heat from one place to another place. In addition to the heat that is moved, the work itself generates heat.
So refrigerator in a heated house is producing extra heat, which is the goal currently in the heated house…
What an I missing?
That’s a really good point I didn’t consider.
Adding heat to a place you want to make warm isn’t a problem.
The general topic was about self-hosting. IPv6 is very useful for self-hosting,… connections.
I’ll admit there is a critical mass problem with torrenting clients, but if you’re trying to set up a wire guard tunnel with your friends, IPv6 is a absolute banger